Date: Thu, 23 Nov 2006 21:58:57 +0100 From: "Christian Walther" <cptsalek@gmail.com> To: "Garrett Cooper" <youshi10@u.washington.edu> Cc: freebsd-questions@freebsd.org Subject: Re: Password Security Message-ID: <14989d6e0611231258l2c432daawc0640f63485e71cf@mail.gmail.com> In-Reply-To: <5DDF6D7C-4FF7-4857-B07E-4462F3C89F97@u.washington.edu> References: <2cd0a0da0611211941iae07787q3f433fb2c8ab1f22@mail.gmail.com> <200611230757.11410.GregoryC@stcinc.com> <5DDF6D7C-4FF7-4857-B07E-4462F3C89F97@u.washington.edu>
next in thread | previous in thread | raw e-mail | index | archive | help
> Being able to Kensington lock the machine so that it can't be opened > (thinking of Dells), you can prevent physical access to a large > degree (only have to worry about people that can screw up the lock), > and prevent people from taking the drive OR resetting the CMOS > jumper, giving people access to the BIOS without a password (one > thing that many people haven't mentioned about security so far). > -Garrett Sorry to disappoint you, but Kensington locks can easily be unlocked, using a toilet paper roll, pen, and tape. We tried this at work because my collegue protected his flat screen with it, but forgot his key at home on the day we moved to a new office. We needed a bit longer, thou... The video is wmv, but I didn't find a version in another format (but mplayer can play it): http://www.toool.nl/kensington623.wmv I wonder if the data on this machine is as sensitive as this thread suggests it... ;)
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?14989d6e0611231258l2c432daawc0640f63485e71cf>